Security Key

Security Key

Security Key

Feature Overview

The Security section in SurveySensum allows administrators to manage keys used for secure communication and encrypted data exchange between SurveySensum and external systems.

Within the Security section, users can manage the following key types:

  • SSH Keys – Used for secure authentication and system integrations without using passwords.

  • PGP Inbound Keys – Used to securely receive encrypted data from external systems.

  • PGP Outbound Keys – Used to encrypt data before sending it to external systems.

By configuring these keys, organizations can maintain secure integrations, encrypted data transfers, and stronger access control across their systems.

SSH Keys

 Feature Overview

SSH keys provide a secure way to authenticate external systems or scripts without using passwords. Instead of relying on traditional credentials, SSH keys use cryptographic key pairs to establish a trusted connection between SurveySensum and other systems.

This feature is typically used when:

  • Integrating SurveySensum with external systems

  • Enabling secure automated data transfers

  • Allowing backend systems to access services securely

Access the SSH Keys Feature

If no keys have been created yet, the page will display a “No keys found” message.
Once clicked, a Generate SSH Key modal this window appears.

Follow these steps after log in to your SurveySensum account to navigate to the SSH Keys section:

  1. Click on Settings from the top navigation bar.

  2. From the left-side menu, select Security Keys.

  3. Inside the Security Keys section, open the SSH Keys tab.

  4. Generate New Key – Used to create a new SSH key for secure authentication.Once clicked, a Generate SSH Key modal window appears where users can provide key details before generating it.
4.1    The Key Name field is used to assign a unique identifier to the SSH key.
Idea
This name helps administrators recognize the purpose of the key later. Using descriptive names makes it easier to manage multiple keys.
4.2  The Key Description field allows users to add additional context about the SSH key.

Idea
This is useful when multiple team members manage integrations or when several keys exist. Although optional, adding a description improves documentation and maintainability.

SSH Keys Management 

1.  Search Keys :-  The Search Keys field allows users to quickly find a specific key by typing its name. This feature is useful when multiple keys are created for different purposes, such as system integrations, automated workflows etc.

Idea
Using clear and descriptive key names makes it easier to find the correct key when using the search feature
2. Refresh :-  Click the Refresh icon to reload the SSH keys list and display the latest updates, such as newly generated keys or status changes.
3. SSH Keys Table :- The Security Keys Table displays all keys created or uploaded within the selected tab.Each row represents a key and provides key-related information.
3.1 Name – Shows the name assigned to the SSH key.
3.2  Fingerprint – A unique identifier for the key. You can copy it using the Click to Copy After copying it, the fingerprint can be shared with external systems, integration partners, or administrators to confirm that the correct key has been configured on both sides verification.
Info
When an SSH key is created, the system generates a very long key (hundreds of characters). Instead of comparing the entire key, systems generate a short summary of that key called a fingerprint.

3.3 Created On – Indicates when the key was generated.

3.4 Status – Shows whether the key is Active or Expired
3.5 Download Public Key- This option allows users to download the public key file. The public key can be shared with external systems or integration partners to enable secure authentication or encrypted data transfers. External systems use this key to encrypt data before sending it to SurveySensum or to verify secure connections.

PGP Inbound 

Feature Overview

The PGP Inbound feature in SurveySensum allows organizations to securely receive encrypted data using PGP (Pretty Good Privacy) encryption.

Notes
PGP encryption ensures that sensitive data transferred to SurveySensum is protected during transmission and can only be decrypted using the corresponding private key.

This feature is particularly useful when:

  • External systems send sensitive data files

  • Data needs to be securely imported into SurveySensum

  • Organizations follow strict data security and compliance requirements

Access the PGP Inbound Feature

If no keys have been created yet, the page will display a “No keys found” message.
When you click Generate New Key, this modal window appears allowing you to configure the new PGP key.

Follow these steps after log in to your SurveySensum account to navigate to the PGP Inbound Keys section:

  1. Click Settings from the top navigation bar.

  2. From the left panel, select Security Keys.

  3. Click the PGP - Inbound tab.

  4. Click Generate New Key to create a new inbound encryption key.

 4.1    The Key Name field is used to assign a unique identifier to the SSH key.
Idea
This name helps administrators recognize the purpose of the key later. Using descriptive names makes it easier to manage multiple keys.
4.2 The Key Description field allows users to provide additional information about the key.

Idea
This helps teams understand the purpose or usage of the key. Although optional, adding a description helps improve documentation and key management.

PGP Inbound Keys Management 


1.  Search Keys :-  The Search Keys field allows users to quickly find a specific key by typing its name. This feature is useful when multiple keys are created for different purposes, such as system integrations, automated workflows etc.
Idea
Using clear and descriptive key names makes it easier to find the correct key when using the search feature
2. Refresh :- Click the Refresh icon to update the key list and display the latest inbound keys and their statuses.
3. PGP-Inbound Table :- The Security Keys Table displays all keys created or uploaded within the selected tab. Each row represents a key and provides key-related information.
3.1 Name – Shows the name assigned to the inbound key.
3.2  Fingerprint – A unique identifier for the key. You can copy it using the Click to Copy After copying it, the fingerprint can be shared with external systems, integration partners, or administrators to confirm that the correct key has been configured on both sides verification.
Info
When an Inbound key is created, the system generates a very long key (hundreds of characters). Instead of comparing the entire key, systems generate a short summary of that key called a fingerprint.

3.3 Created On – Indicates when the key was generated.

3.4 Status – Shows whether the key is Active or Expired
3.5 Download Public Key- This option allows users to download the public key file. The public key can be shared with external systems or integration partners to enable secure authentication or encrypted data transfers. External systems use this key to encrypt data before sending it to SurveySensum or to verify secure connections.

PGP Outbound

Feature Overview

The PGP Outbound feature in SurveySensum is used to securely send encrypted data from SurveySensum to external systems using PGP (Pretty Good Privacy) encryption.

Notes
This ensures that sensitive information such as survey data files remains secure while being transmitted to external platforms.

PGP Outbound encryption is commonly used when:

  • Sending survey data to external systems

  • Integrating with third-party platforms that require encrypted file transfers

Access the PGP Outbound Feature    

When you click Upload Key, a modal window titled Upload PGP Public Key appears
When you click Upload Key, a modal window titled Upload PGP Public Key appears

Follow these steps after log in to your SurveySensum account to navigate to the PGP Outbound Keys section:
  1. Click Settings from the top navigation menu.
  2. From the left-side panel, select Security Keys.
  3. Click the PGP - Outbound tab.
  4. Click Upload Key to add a new PGP public key. When you click Upload Key, a modal window titled Upload PGP Public Key appears.
4.1    Click the upload area to select a file.
4.2   Click Upload Key to add the public key to the system.
4.3  The Cancel button closes the upload window without uploading the key.

Info
Once uploaded, the key will appear in the PGP Outbound Keys list and will be available for use in outbound encryption processes.
Warning

Always verify the public key provided by the receiving system before uploading it. This ensures that encrypted data is sent to the correct destination and can only be decrypted by the intended recipient.


PGP Outbound Keys Management






1.  Search Keys :-  The Search Keys field allows users to quickly find a specific key by typing its name. This feature is useful when multiple keys are created for different purposes, such as system integrations, automated workflows etc.
Idea
Using clear and descriptive key names makes it easier to find the correct key when using the search feature
2. Refresh :- Click the Refresh icon to update the key list and display the latest outbound keys and their statuses.
3.  PGP-Outbound Table :- The Security Keys Table displays all keys uploaded within the selected tab. Each row represents a key and provides key-related information.
3.1 Name – Shows the name assigned to the inbound key.
3.2  Fingerprint – Displays the key fingerprint (may appear as unavailable for some uploaded keys). A unique identifier for the key. You can copy it using the Click to Copy After copying it, the fingerprint can be shared with external systems, integration partners, or administrators to confirm that the correct key has been configured on both sides verification.
Info
When key is created, the system generates a very long key (hundreds of characters). Instead of comparing the entire key, systems generate a short summary of that key called a fingerprint.

3.3 Created On – Indicates when the key was generated.

3.4 Status – Shows whether the key is Active or Expired
3.5 Download Public Key- This option allows users to download the public key file which you uploaded. The public key can be shared with external systems or integration partners to enable secure authentication or encrypted data transfers. 


    • Related Articles

    • Email Notification

      What is Email notification? Creating and analyzing surveys is not enough to keep your customers loyal and engaged. Completing engagement with your consumers and closing the loop is key to a successful business. Identify gaps with your survey and take ...